A Novel Key Chain-Based En-route Filtering Protocol For Wireless Sensor Networks
Published Online: Sep 05, 2013
Page range: 1637 - 1652
Received: Apr 20, 2013
Accepted: Jul 26, 2013
DOI: https://doi.org/10.21307/ijssis-2017-608
Keywords
© 2013 Zhiming Zhang et al., published by Sciendo
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Sensor nodes may be deployed in hostile environments. An adversary may compromise the sensor nodes and inject false data into the network, which wastes scarce energy resources of the forwarding nodes. Existing schemes can effectively resist false data injection, but most of them do not consider the identifiers (IDs) attack, the en-route nodes check only the Message Authentication Codes (MACs) and do not verify the nodes identifiers (IDs) of the endorsing reports. In this paper, we propose a novel security routing protocol (KCEFP) based on one-way key chain. The proposed protocol can resist false data injection, replay and IDs attacks, and if the endorsement report is modified, the forwarding nodes can verify the endorsement report by the key chain, and filters out the fabricated packet right now. The security and performance analysis shows that our scheme provides a high security level and the energy savings significantly increasing with the number of fabricated report packet increasing.